// For flags

CVE-2012-0805

python-sqlalchemy: SQL injection flaw due to not checking LIMIT input for correct type

Severity Score

7.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple SQL injection vulnerabilities in SQLAlchemy before 0.7.0b4, as used in Keystone, allow remote attackers to execute arbitrary SQL commands via the (1) limit or (2) offset keyword to the select function, or unspecified vectors to the (3) select.limit or (4) select.offset function.

Múltiples vulnerabilidades de inyección SQL en SQLAlchemy antes v0.7.0b4, tal y como se usa en Keystone, permite a atacantes remotos ejecutar comandos SQL a través de las palabras clave (1) limit (límite) o (2) offset (desplazamiento) a la función de select (selección), o de vectores no especificados a las funciones (3) select.limit o (4) select.offset.

SQLAlchemy is an Object Relational Mapper that provides a flexible, high-level interface to SQL databases. It was discovered that SQLAlchemy did not sanitize values for the limit and offset keywords for SQL select statements. If an application using SQLAlchemy accepted values for these keywords, and did not filter or sanitize them before passing them to SQLAlchemy, it could allow an attacker to perform an SQL injection attack against the application. All users of python-sqlalchemy are advised to upgrade to this updated package, which contains a patch to correct this issue. All running applications using SQLAlchemy must be restarted for this update to take effect.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-01-19 CVE Reserved
  • 2012-03-07 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sqlalchemy
Search vendor "Sqlalchemy"
Sqlalchemy
Search vendor "Sqlalchemy" for product "Sqlalchemy"
<= 0.7.0
Search vendor "Sqlalchemy" for product "Sqlalchemy" and version " <= 0.7.0"
b3
Affected
Sqlalchemy
Search vendor "Sqlalchemy"
Sqlalchemy
Search vendor "Sqlalchemy" for product "Sqlalchemy"
0.6.0
Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.0"
-
Affected
Sqlalchemy
Search vendor "Sqlalchemy"
Sqlalchemy
Search vendor "Sqlalchemy" for product "Sqlalchemy"
0.6.0
Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.0"
beta1
Affected
Sqlalchemy
Search vendor "Sqlalchemy"
Sqlalchemy
Search vendor "Sqlalchemy" for product "Sqlalchemy"
0.6.0
Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.0"
beta2
Affected
Sqlalchemy
Search vendor "Sqlalchemy"
Sqlalchemy
Search vendor "Sqlalchemy" for product "Sqlalchemy"
0.6.0
Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.0"
beta3
Affected
Sqlalchemy
Search vendor "Sqlalchemy"
Sqlalchemy
Search vendor "Sqlalchemy" for product "Sqlalchemy"
0.6.1
Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.1"
-
Affected
Sqlalchemy
Search vendor "Sqlalchemy"
Sqlalchemy
Search vendor "Sqlalchemy" for product "Sqlalchemy"
0.6.2
Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.2"
-
Affected
Sqlalchemy
Search vendor "Sqlalchemy"
Sqlalchemy
Search vendor "Sqlalchemy" for product "Sqlalchemy"
0.6.3
Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.3"
-
Affected
Sqlalchemy
Search vendor "Sqlalchemy"
Sqlalchemy
Search vendor "Sqlalchemy" for product "Sqlalchemy"
0.6.4
Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.4"
-
Affected
Sqlalchemy
Search vendor "Sqlalchemy"
Sqlalchemy
Search vendor "Sqlalchemy" for product "Sqlalchemy"
0.6.5
Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.5"
-
Affected
Sqlalchemy
Search vendor "Sqlalchemy"
Sqlalchemy
Search vendor "Sqlalchemy" for product "Sqlalchemy"
0.6.6
Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.6"
-
Affected
Sqlalchemy
Search vendor "Sqlalchemy"
Sqlalchemy
Search vendor "Sqlalchemy" for product "Sqlalchemy"
0.6.7
Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.6.7"
-
Affected
Sqlalchemy
Search vendor "Sqlalchemy"
Sqlalchemy
Search vendor "Sqlalchemy" for product "Sqlalchemy"
0.7.0
Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.7.0"
b1
Affected
Sqlalchemy
Search vendor "Sqlalchemy"
Sqlalchemy
Search vendor "Sqlalchemy" for product "Sqlalchemy"
0.7.0
Search vendor "Sqlalchemy" for product "Sqlalchemy" and version "0.7.0"
b2
Affected